Analysis
-
max time kernel
91s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 20:05
Behavioral task
behavioral1
Sample
48aa73d0d6421cf3f140fa0600c109669160c62f1653bc6da1b1568b5fee87fb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
48aa73d0d6421cf3f140fa0600c109669160c62f1653bc6da1b1568b5fee87fb.exe
Resource
win10v2004-20240226-en
General
-
Target
48aa73d0d6421cf3f140fa0600c109669160c62f1653bc6da1b1568b5fee87fb.exe
-
Size
162KB
-
MD5
adcece00c37a44e4307d6757d111c636
-
SHA1
b61ce5c23e1b6e9df5fe5bfa998ca747cb06d929
-
SHA256
48aa73d0d6421cf3f140fa0600c109669160c62f1653bc6da1b1568b5fee87fb
-
SHA512
0f2f54bfcf181a266340a648a6e6bdcddb11e658ffcb2b953a9033d789f42d2b654ec77ab05632dcfc92eb4f9a9a2baf85ea25a65ce9d4647338bd0ae89f6ffb
-
SSDEEP
3072:3dEUfKj8BYbDiC1ZTK7sxtLUIG9/pHQqzGw:3USiZTK40ZpHQqCw
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 64 IoCs
resource yara_rule behavioral2/memory/3288-0-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/files/0x000a000000023175-6.dat UPX behavioral2/files/0x00090000000226e5-41.dat UPX behavioral2/files/0x00080000000231ce-71.dat UPX behavioral2/memory/1388-73-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/files/0x000b0000000231b6-107.dat UPX behavioral2/files/0x00070000000231d8-142.dat UPX behavioral2/memory/2540-144-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/files/0x00070000000231da-178.dat UPX behavioral2/files/0x00070000000231db-213.dat UPX behavioral2/memory/3288-243-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/files/0x00070000000231dc-249.dat UPX behavioral2/memory/3860-255-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/memory/1388-280-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/files/0x00080000000231dd-286.dat UPX behavioral2/memory/1012-316-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/files/0x00090000000231df-322.dat UPX behavioral2/files/0x00080000000231e1-359.dat UPX behavioral2/memory/2540-352-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/files/0x00070000000231e2-393.dat UPX behavioral2/memory/4068-394-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/memory/4340-423-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/files/0x00070000000231e5-429.dat UPX behavioral2/memory/1728-463-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/files/0x00070000000231e6-465.dat UPX behavioral2/memory/2248-467-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/files/0x00070000000231e8-501.dat UPX behavioral2/memory/4860-528-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/files/0x00070000000231e9-537.dat UPX behavioral2/memory/2824-539-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/memory/3624-568-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/files/0x00070000000231ea-574.dat UPX behavioral2/memory/2160-604-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/files/0x00070000000231eb-611.dat UPX behavioral2/memory/1568-618-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/files/0x00070000000231ec-647.dat UPX behavioral2/memory/5008-648-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/memory/2248-678-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/memory/1000-679-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/files/0x00070000000231ed-685.dat UPX behavioral2/memory/336-713-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/memory/4340-746-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/memory/2872-755-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/memory/4732-785-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/memory/5104-792-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/memory/2824-822-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/memory/3960-852-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/memory/2416-912-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/memory/4732-945-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/memory/3552-978-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/memory/680-1011-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/memory/4968-1020-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/memory/2136-1082-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/memory/3132-1086-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/memory/4420-1143-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/memory/3948-1176-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/memory/5040-1209-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/memory/540-1210-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/memory/4396-1216-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/memory/2136-1244-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/memory/2504-1277-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/memory/4388-1310-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/memory/4468-1343-0x0000000000400000-0x000000000049F000-memory.dmp UPX behavioral2/memory/4396-1376-0x0000000000400000-0x000000000049F000-memory.dmp UPX -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqembnyek.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemvmuzl.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemeedtj.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemevmgy.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemzgnoq.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemwwpae.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemkmtcu.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemvwkdj.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemkehop.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemnpjpy.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemxjdkg.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemjbbyt.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemgcwze.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemecati.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemswduo.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqempaavm.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemeuhlv.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemzvcbm.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemlrnye.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemwlszu.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemixgux.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemprlee.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemevtng.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemrsvlz.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemapzqm.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemwiras.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemdmgtq.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemtfodf.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemmmbea.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemkhchs.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemmlacf.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemejaoj.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemejdon.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemxaliw.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemwidnw.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemjdzho.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemrtgzq.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemeswga.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemrrbcf.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemjuafh.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqeminfhw.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqembwttf.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemdkriv.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemmvvym.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemwogol.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemevlgs.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemjolad.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemihqxr.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemaaafb.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemidlvj.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemesrbv.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemmquhi.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemrzjsc.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemzcyyo.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemltofg.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemqijhm.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemqmzda.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemspkod.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemkwvfx.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemmspyo.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemzemft.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemmiukn.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemhnuqk.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Sysqemtkxjk.exe -
Executes dropped EXE 64 IoCs
pid Process 3860 Sysqemhawpg.exe 1388 Sysqemrzjsc.exe 1012 Sysqemzemft.exe 2540 Sysqemjzmqb.exe 4068 Sysqempxrxo.exe 4340 Sysqemjolad.exe 1728 Sysqembszlf.exe 4860 Sysqemkdklo.exe 2824 Sysqemejaoj.exe 3624 Sysqemevmgy.exe 2160 Sysqemmkauj.exe 5008 Sysqemztepm.exe 2248 Sysqemctwzw.exe 1000 Sysqemegycr.exe 336 Sysqemrbisx.exe 4340 Sysqemrigxo.exe 2872 Sysqemwczsz.exe 5104 Sysqempzzlv.exe 2824 Sysqemmlvyl.exe 3960 Sysqemjbbyt.exe 2416 Sysqemzcyyo.exe 4732 Sysqemodlrp.exe 3552 Sysqemzgnoq.exe 680 Sysqemmiukn.exe 4968 Sysqemwlszu.exe 3132 Sysqemtfouk.exe 4420 Sysqemltofg.exe 3948 Sysqemeqgqc.exe 5040 Sysqemrsvlz.exe 540 Sysqemeqrbt.exe 2136 Sysqemgwfej.exe 2504 Sysqemobpra.exe 4388 Sysqemoecjp.exe 4468 Sysqemejdon.exe 4396 Sysqembvgkd.exe 1516 Sysqemlgxzk.exe 748 Sysqemduxkg.exe 1028 Sysqemjoinj.exe 3600 Sysqemihqxr.exe 3236 Sysqemorzgt.exe 3112 Sysqemgfzqq.exe 4448 Sysqembwttf.exe 4216 Sysqemvcjoi.exe 2136 Sysqemgcwze.exe 3484 Sysqemixahs.exe 3260 Sysqemataag.exe 4476 Sysqemjuafh.exe 3100 Sysqemwwpae.exe 4044 Sysqemgkrdn.exe 4292 Sysqemvdpdi.exe 4360 Sysqembnyek.exe 4212 Sysqemdxzho.exe 4420 Sysqemvanrq.exe 2188 Sysqeminfhw.exe 4416 Sysqemayrzk.exe 1268 Sysqemkmtcu.exe 4424 Sysqemqznqr.exe 1768 Sysqemdmgtq.exe 1756 Sysqemntkqb.exe 2388 Sysqemvxuds.exe 2340 Sysqemqaagc.exe 2888 Sysqemizdeb.exe 3516 Sysqemljdhe.exe 1780 Sysqemqijhm.exe -
resource yara_rule behavioral2/memory/3288-0-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/files/0x000a000000023175-6.dat upx behavioral2/files/0x00090000000226e5-41.dat upx behavioral2/files/0x00080000000231ce-71.dat upx behavioral2/memory/1388-73-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/files/0x000b0000000231b6-107.dat upx behavioral2/files/0x00070000000231d8-142.dat upx behavioral2/memory/2540-144-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/files/0x00070000000231da-178.dat upx behavioral2/files/0x00070000000231db-213.dat upx behavioral2/memory/3288-243-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/files/0x00070000000231dc-249.dat upx behavioral2/memory/3860-255-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/1388-280-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/files/0x00080000000231dd-286.dat upx behavioral2/memory/1012-316-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/files/0x00090000000231df-322.dat upx behavioral2/files/0x00080000000231e1-359.dat upx behavioral2/memory/2540-352-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/files/0x00070000000231e2-393.dat upx behavioral2/memory/4068-394-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/4340-423-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/files/0x00070000000231e5-429.dat upx behavioral2/memory/1728-463-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/files/0x00070000000231e6-465.dat upx behavioral2/memory/2248-467-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/files/0x00070000000231e8-501.dat upx behavioral2/memory/4860-528-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/files/0x00070000000231e9-537.dat upx behavioral2/memory/2824-539-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/3624-568-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/files/0x00070000000231ea-574.dat upx behavioral2/memory/2160-604-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/files/0x00070000000231eb-611.dat upx behavioral2/memory/1568-618-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/files/0x00070000000231ec-647.dat upx behavioral2/memory/5008-648-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/2248-678-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/1000-679-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/files/0x00070000000231ed-685.dat upx behavioral2/memory/336-713-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/4340-746-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/2872-755-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/4732-785-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/5104-792-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/2824-822-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/3960-852-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/2416-912-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/4732-945-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/3552-978-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/680-1011-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/4968-1020-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/2136-1082-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/3132-1086-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/4420-1143-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/3948-1176-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/5040-1209-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/540-1210-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/4396-1216-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/2136-1244-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/2504-1277-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/4388-1310-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/4468-1343-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/4396-1376-0x0000000000400000-0x000000000049F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxaliw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfxeni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeedtj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeywkp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrrbcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjzmqb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzcyyo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqqvtu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxvwxh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyrchs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjbbyt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembwttf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdmgtq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqdoui.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkeakj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsyjne.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemubmzh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrtgzq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmkauj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempzzlv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhdamd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhawpg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemouqyn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqeminfhw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnnctv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkwvfx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwplqt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjffqo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwjeru.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgfzqq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkmtcu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaaafb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemikeqc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemshuxv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnkuwj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwidnw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtfouk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemejdon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemofnuj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiefvs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrqugt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtfodf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfqavp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfycab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemprlee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwtzgv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembottd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemofyta.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemntkqb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvuefh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfotxb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemevlgs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvhguf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmmbea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgdhhi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrbisx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemodlrp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvxuds.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemewxss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtkxjk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempxrxo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembszlf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemapzqm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfffru.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3288 wrote to memory of 3860 3288 48aa73d0d6421cf3f140fa0600c109669160c62f1653bc6da1b1568b5fee87fb.exe 91 PID 3288 wrote to memory of 3860 3288 48aa73d0d6421cf3f140fa0600c109669160c62f1653bc6da1b1568b5fee87fb.exe 91 PID 3288 wrote to memory of 3860 3288 48aa73d0d6421cf3f140fa0600c109669160c62f1653bc6da1b1568b5fee87fb.exe 91 PID 3860 wrote to memory of 1388 3860 Sysqemhawpg.exe 93 PID 3860 wrote to memory of 1388 3860 Sysqemhawpg.exe 93 PID 3860 wrote to memory of 1388 3860 Sysqemhawpg.exe 93 PID 1388 wrote to memory of 1012 1388 Sysqemrzjsc.exe 94 PID 1388 wrote to memory of 1012 1388 Sysqemrzjsc.exe 94 PID 1388 wrote to memory of 1012 1388 Sysqemrzjsc.exe 94 PID 1012 wrote to memory of 2540 1012 Sysqemzemft.exe 95 PID 1012 wrote to memory of 2540 1012 Sysqemzemft.exe 95 PID 1012 wrote to memory of 2540 1012 Sysqemzemft.exe 95 PID 2540 wrote to memory of 4068 2540 Sysqemjzmqb.exe 96 PID 2540 wrote to memory of 4068 2540 Sysqemjzmqb.exe 96 PID 2540 wrote to memory of 4068 2540 Sysqemjzmqb.exe 96 PID 4068 wrote to memory of 4340 4068 Sysqempxrxo.exe 97 PID 4068 wrote to memory of 4340 4068 Sysqempxrxo.exe 97 PID 4068 wrote to memory of 4340 4068 Sysqempxrxo.exe 97 PID 4340 wrote to memory of 1728 4340 Sysqemjolad.exe 98 PID 4340 wrote to memory of 1728 4340 Sysqemjolad.exe 98 PID 4340 wrote to memory of 1728 4340 Sysqemjolad.exe 98 PID 1728 wrote to memory of 4860 1728 Sysqembszlf.exe 99 PID 1728 wrote to memory of 4860 1728 Sysqembszlf.exe 99 PID 1728 wrote to memory of 4860 1728 Sysqembszlf.exe 99 PID 4860 wrote to memory of 2824 4860 Sysqemkdklo.exe 115 PID 4860 wrote to memory of 2824 4860 Sysqemkdklo.exe 115 PID 4860 wrote to memory of 2824 4860 Sysqemkdklo.exe 115 PID 2824 wrote to memory of 3624 2824 Sysqemejaoj.exe 101 PID 2824 wrote to memory of 3624 2824 Sysqemejaoj.exe 101 PID 2824 wrote to memory of 3624 2824 Sysqemejaoj.exe 101 PID 3624 wrote to memory of 2160 3624 Sysqemevmgy.exe 104 PID 3624 wrote to memory of 2160 3624 Sysqemevmgy.exe 104 PID 3624 wrote to memory of 2160 3624 Sysqemevmgy.exe 104 PID 1568 wrote to memory of 5008 1568 Sysqemwjeru.exe 106 PID 1568 wrote to memory of 5008 1568 Sysqemwjeru.exe 106 PID 1568 wrote to memory of 5008 1568 Sysqemwjeru.exe 106 PID 5008 wrote to memory of 2248 5008 Sysqemztepm.exe 108 PID 5008 wrote to memory of 2248 5008 Sysqemztepm.exe 108 PID 5008 wrote to memory of 2248 5008 Sysqemztepm.exe 108 PID 2248 wrote to memory of 1000 2248 Sysqemctwzw.exe 110 PID 2248 wrote to memory of 1000 2248 Sysqemctwzw.exe 110 PID 2248 wrote to memory of 1000 2248 Sysqemctwzw.exe 110 PID 1000 wrote to memory of 336 1000 Sysqemegycr.exe 111 PID 1000 wrote to memory of 336 1000 Sysqemegycr.exe 111 PID 1000 wrote to memory of 336 1000 Sysqemegycr.exe 111 PID 336 wrote to memory of 4340 336 Sysqemrbisx.exe 112 PID 336 wrote to memory of 4340 336 Sysqemrbisx.exe 112 PID 336 wrote to memory of 4340 336 Sysqemrbisx.exe 112 PID 4340 wrote to memory of 2872 4340 Sysqemrigxo.exe 129 PID 4340 wrote to memory of 2872 4340 Sysqemrigxo.exe 129 PID 4340 wrote to memory of 2872 4340 Sysqemrigxo.exe 129 PID 2872 wrote to memory of 5104 2872 Sysqemwczsz.exe 114 PID 2872 wrote to memory of 5104 2872 Sysqemwczsz.exe 114 PID 2872 wrote to memory of 5104 2872 Sysqemwczsz.exe 114 PID 5104 wrote to memory of 2824 5104 Sysqempzzlv.exe 115 PID 5104 wrote to memory of 2824 5104 Sysqempzzlv.exe 115 PID 5104 wrote to memory of 2824 5104 Sysqempzzlv.exe 115 PID 2824 wrote to memory of 3960 2824 Sysqemmlvyl.exe 117 PID 2824 wrote to memory of 3960 2824 Sysqemmlvyl.exe 117 PID 2824 wrote to memory of 3960 2824 Sysqemmlvyl.exe 117 PID 3960 wrote to memory of 2416 3960 Sysqemjbbyt.exe 118 PID 3960 wrote to memory of 2416 3960 Sysqemjbbyt.exe 118 PID 3960 wrote to memory of 2416 3960 Sysqemjbbyt.exe 118 PID 2416 wrote to memory of 4732 2416 Sysqemzcyyo.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\48aa73d0d6421cf3f140fa0600c109669160c62f1653bc6da1b1568b5fee87fb.exe"C:\Users\Admin\AppData\Local\Temp\48aa73d0d6421cf3f140fa0600c109669160c62f1653bc6da1b1568b5fee87fb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhawpg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhawpg.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrzjsc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrzjsc.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzemft.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzemft.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjzmqb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjzmqb.exe"5⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\Sysqempxrxo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempxrxo.exe"6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjolad.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjolad.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\Sysqembszlf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembszlf.exe"8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkdklo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkdklo.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\Sysqemejaoj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemejaoj.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\Sysqemevmgy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemevmgy.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmkauj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmkauj.exe"12⤵
- Executes dropped EXE
- Modifies registry class
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwjeru.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwjeru.exe"13⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\Sysqemztepm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemztepm.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\Sysqemctwzw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemctwzw.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\Sysqemegycr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemegycr.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrbisx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrbisx.exe"17⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrigxo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrigxo.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwczsz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwczsz.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\Sysqempzzlv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempzzlv.exe"20⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmlvyl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmlvyl.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjbbyt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjbbyt.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzcyyo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzcyyo.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\Sysqemodlrp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemodlrp.exe"24⤵
- Executes dropped EXE
- Modifies registry class
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzgnoq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzgnoq.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmiukn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmiukn.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
PID:680 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwlszu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwlszu.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtfouk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtfouk.exe"28⤵
- Executes dropped EXE
- Modifies registry class
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\Sysqemltofg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemltofg.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeqgqc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeqgqc.exe"30⤵
- Executes dropped EXE
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrsvlz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrsvlz.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeqrbt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeqrbt.exe"32⤵
- Executes dropped EXE
PID:540 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgwfej.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgwfej.exe"33⤵
- Executes dropped EXE
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\Sysqemobpra.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemobpra.exe"34⤵
- Executes dropped EXE
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoecjp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoecjp.exe"35⤵
- Executes dropped EXE
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\Sysqemejdon.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemejdon.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\Sysqembvgkd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembvgkd.exe"37⤵
- Executes dropped EXE
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlgxzk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlgxzk.exe"38⤵
- Executes dropped EXE
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\Sysqemduxkg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemduxkg.exe"39⤵
- Executes dropped EXE
PID:748 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjoinj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjoinj.exe"40⤵
- Executes dropped EXE
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\Sysqemihqxr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemihqxr.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\Sysqemorzgt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemorzgt.exe"42⤵
- Executes dropped EXE
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgfzqq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgfzqq.exe"43⤵
- Executes dropped EXE
- Modifies registry class
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\Sysqembwttf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembwttf.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvcjoi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvcjoi.exe"45⤵
- Executes dropped EXE
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgcwze.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgcwze.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\Sysqemixahs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemixahs.exe"47⤵
- Executes dropped EXE
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\Sysqemataag.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemataag.exe"48⤵
- Executes dropped EXE
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjuafh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjuafh.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwwpae.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwwpae.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgkrdn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgkrdn.exe"51⤵
- Executes dropped EXE
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvdpdi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvdpdi.exe"52⤵
- Executes dropped EXE
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\Sysqembnyek.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembnyek.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdxzho.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdxzho.exe"54⤵
- Executes dropped EXE
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvanrq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvanrq.exe"55⤵
- Executes dropped EXE
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\Sysqeminfhw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqeminfhw.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\Sysqemayrzk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemayrzk.exe"57⤵
- Executes dropped EXE
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkmtcu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkmtcu.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqznqr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqznqr.exe"59⤵
- Executes dropped EXE
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdmgtq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdmgtq.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\Sysqemntkqb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemntkqb.exe"61⤵
- Executes dropped EXE
- Modifies registry class
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvxuds.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvxuds.exe"62⤵
- Executes dropped EXE
- Modifies registry class
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqaagc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqaagc.exe"63⤵
- Executes dropped EXE
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\Sysqemizdeb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemizdeb.exe"64⤵
- Executes dropped EXE
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\Sysqemljdhe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemljdhe.exe"65⤵
- Executes dropped EXE
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqijhm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqijhm.exe"66⤵
- Checks computer location settings
- Executes dropped EXE
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\Sysqemihmfl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemihmfl.exe"67⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdkriv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdkriv.exe"68⤵
- Checks computer location settings
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqmzda.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqmzda.exe"69⤵
- Checks computer location settings
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaaafb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaaafb.exe"70⤵
- Checks computer location settings
- Modifies registry class
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfbras.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfbras.exe"71⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqqvtu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqqvtu.exe"72⤵
- Modifies registry class
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\Sysqemapzqm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemapzqm.exe"73⤵
- Checks computer location settings
- Modifies registry class
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnnctv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnnctv.exe"74⤵
- Modifies registry class
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\Sysqemspkod.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemspkod.exe"75⤵
- Checks computer location settings
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfffru.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfffru.exe"76⤵
- Modifies registry class
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsawoz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsawoz.exe"77⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\Sysqemapkbd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemapkbd.exe"78⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\Sysqemixgux.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemixgux.exe"79⤵
- Checks computer location settings
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiyfue.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiyfue.exe"80⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfkahc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfkahc.exe"81⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvanuv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvanuv.exe"82⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfklsu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfklsu.exe"83⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxkoqt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxkoqt.exe"84⤵PID:3780
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvwkdj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvwkdj.exe"85⤵
- Checks computer location settings
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfslny.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfslny.exe"86⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnhzic.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnhzic.exe"87⤵PID:3580
-
C:\Users\Admin\AppData\Local\Temp\Sysqemikeqc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemikeqc.exe"88⤵
- Modifies registry class
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkehop.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkehop.exe"89⤵
- Checks computer location settings
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvmuzl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvmuzl.exe"90⤵
- Checks computer location settings
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqdoui.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqdoui.exe"91⤵
- Modifies registry class
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnpjpy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnpjpy.exe"92⤵
- Checks computer location settings
PID:456 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkjfcw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkjfcw.exe"93⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxoxkw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxoxkw.exe"94⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvuefh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvuefh.exe"95⤵
- Modifies registry class
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxaliw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxaliw.exe"96⤵
- Checks computer location settings
- Modifies registry class
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfxeni.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfxeni.exe"97⤵
- Modifies registry class
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\Sysqemidlvj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemidlvj.exe"98⤵
- Checks computer location settings
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmqfdc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmqfdc.exe"99⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsdxgt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsdxgt.exe"100⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkzxrp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkzxrp.exe"101⤵PID:4004
-
C:\Users\Admin\AppData\Local\Temp\Sysqemshuxv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemshuxv.exe"102⤵
- Modifies registry class
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxjdkg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxjdkg.exe"103⤵
- Checks computer location settings
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkwvfx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkwvfx.exe"104⤵
- Checks computer location settings
- Modifies registry class
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfqavp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfqavp.exe"105⤵
- Modifies registry class
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfycab.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfycab.exe"106⤵
- Modifies registry class
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmgxav.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmgxav.exe"107⤵PID:3696
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmvvym.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmvvym.exe"108⤵
- Checks computer location settings
PID:736 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkautf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkautf.exe"109⤵PID:3160
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnkuwj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnkuwj.exe"110⤵
- Modifies registry class
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmzkba.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmzkba.exe"111⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsaawq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsaawq.exe"112⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\Sysqemprlee.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemprlee.exe"113⤵
- Checks computer location settings
- Modifies registry class
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxvwxh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxvwxh.exe"114⤵
- Modifies registry class
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkeakj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkeakj.exe"115⤵
- Modifies registry class
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\Sysqemevtng.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemevtng.exe"116⤵
- Checks computer location settings
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhnuqk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhnuqk.exe"117⤵
- Checks computer location settings
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsyjne.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsyjne.exe"118⤵
- Modifies registry class
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\Sysqemutlqz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemutlqz.exe"119⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwogol.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwogol.exe"120⤵
- Checks computer location settings
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\Sysqemesrbv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemesrbv.exe"121⤵
- Checks computer location settings
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeedtj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeedtj.exe"122⤵
- Checks computer location settings
- Modifies registry class
PID:4444
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-